Skip to content

Commit

Permalink
Add cis-1.8 assessment page (#272)
Browse files Browse the repository at this point in the history
* Initial commit of kubebench to self assessment script
* Add new cis-1.8 assessment page
* Rename assessment guides, configure redirects
* Add blank pages for translations

Signed-off-by: Derek Nola <[email protected]>
  • Loading branch information
dereknola authored Apr 25, 2024
1 parent fcd1d3c commit 0ade62a
Show file tree
Hide file tree
Showing 16 changed files with 1,996 additions and 13 deletions.
3 changes: 0 additions & 3 deletions docs/advanced.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,5 @@
---
title: "Advanced Options / Configuration"
aliases:
- /k3s/latest/en/running/
- /k3s/latest/en/configuration/
---

This section contains advanced information describing the different ways you can run and manage K3s, as well as steps necessary to prepare the host OS for K3s use.
Expand Down
2 changes: 1 addition & 1 deletion docs/security/hardening-guide.md
Original file line number Diff line number Diff line change
Expand Up @@ -852,4 +852,4 @@ For `default` service accounts in the built-in namespaces (`kube-system`, `kube-

## Conclusion

If you have followed this guide, your K3s cluster will be configured to comply with the CIS Kubernetes Benchmark. You can review the [CIS Benchmark Self-Assessment Guide](self-assessment.md) to understand the expectations of each of the benchmark's checks and how you can do the same on your cluster.
If you have followed this guide, your K3s cluster will be configured to comply with the CIS Kubernetes Benchmark. You can review the [CIS 1.8 Self-Assessment Guide](self-assessment-1.8.md) to understand the expectations of each of the benchmark's checks and how you can do the same on your cluster.
11 changes: 9 additions & 2 deletions docs/security/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,14 @@ title: "Security"

This section describes the methodology and means of securing a K3s cluster. It's broken into 2 sections. These guides assume k3s is running with embedded etcd.

The documents below apply to CIS Kubernetes Benchmark v1.23.
First the hardening guide provides a list of security best practices to secure a K3s cluster.

* [Hardening Guide](hardening-guide.md)
* [CIS Benchmark Self-Assessment Guide](self-assessment.md)

Second, is the self assessment to validate a hardened cluster. We currently have two different assessments available:

* [CIS 1.23 Benchmark Self-Assessment Guide](self-assessment-1.23.md), older version of the CIS benchmark

* [CIS 1.8 Benchmark Self-Assessment Guide](self-assessment-1.8.md), newer version of the CIS benchmark


Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: CIS Self Assessment Guide
title: CIS 1.23 Self Assessment Guide
---

### CIS Kubernetes Benchmark v1.23 - K3s with Kubernetes v1.22 to v1.24
Expand Down
Loading

0 comments on commit 0ade62a

Please sign in to comment.